Professional Documents
Culture Documents
WMC Assignment F1+F2+F3
WMC Assignment F1+F2+F3
Assignment-I
1. The company has a Class B IP address range of 172.16.0.0/16. If they decide to use
subnetting for each VLAN, and each subnet can accommodate a maximum of 30 hosts,
calculate the number of subnets created.
Given:
To calculate the number of subnets, we first need to determine how many bits are required for
host addressing within each subnet. Since we need to accommodate a maximum of 30 hosts per
subnet, we need at least 5 host bits (2^5 - 2 = 30, subtracting 2 for network and broadcast
addresses).
Now, we subtract the number of host bits from the total number of bits in the subnet mask: 16
(total bits) - 5 (host bits) = 11 subnet bits
Using these 11 subnet bits, we calculate the number of subnets using the formula 2^n, where n is
the number of subnet bits.
Number of subnets = 2^11 = 2048
So, the correct answer is indeed 2048 subnets within the Class B IP address range 172.16.0.0/16,
each accommodating a maximum of 30 hosts per subnet.
OR
To calculate the number of subnets created, we first need to determine the subnet size that can
accommodate 30 hosts.
In binary, 30 is represented as 11110. However, we need to account for the network address and
broadcast address, which are not available for hosts. So, we need a subnet size that can
accommodate at least 32 addresses (30 hosts + 2 for network and broadcast).
In binary, 32 is 100000, which requires 5 bits. Therefore, we need to reserve 5 bits for host
addresses in each subnet.
Since an IPv4 address is 32 bits long, and we’re starting with a /16 prefix (for the Class B IP
address range), we have 16 bits remaining for subnetting. If we reserve 5 bits for hosts, we have
11 bits left for subnets.
Therefore, the company can create 2048 subnets with their Class B IP address range of
172.16.0.0/16, where each subnet can accommodate a maximum of 30 hosts.
2. For one of the VLANs, the company decides to use CIDR (Classless Inter-Domain
Routing) notation to represent the subnet. If this VLAN requires at least 120 hosts,
determine the appropriate CIDR notation for this subnet.
To determine the appropriate CIDR notation for a subnet that requires at least 120 hosts, we first
need to find out how many host bits are required to accommodate 120 hosts.
Since we need to accommodate at least 120 hosts, we need at least 7 host bits (2^7 - 2 = 126,
subtracting 2 for network and broadcast addresses).
Now, we need to find the smallest CIDR subnet that can accommodate at least 120 hosts
Given that we need to accommodate at least 120 hosts, we previously determined that we need at
least 7 host bits.
Starting with the Class B network 172.16.0.0/16, which has 16 bits for the network portion and
16 bits for the host portion, we need to borrow additional bits from the host portion to create
subnets with enough host addresses.
To accommodate at least 120 hosts, we could use a subnet with a /25 CIDR notation, which
would provide 7 host bits (32 - 25 = 7) and 2^7 - 2 = 126 usable host addresses (subtracting 2 for
the network and broadcast addresses).
So, the appropriate CIDR notation for the VLAN subnet requiring at least 120 hosts would be:
172.16.0.0/25
3. The company is planning to integrate IPv6 into its network. If the IPv6 address format is
used, and assuming a single VLAN requires 10,000 unique addresses, calculate the size of
the IPv6 address space needed for this VLAN.
4. Explain the concept of intranet and internet. compare their functionalities and discuss
their significance in modern business environments.
Intranet:
It uses Internet protocols and technologies for sharing information and resources within
an organization.
Intranets typically include internal websites, file-sharing systems, email systems, and
other collaborative tools.
They provide a secure environment for internal communication and data sharing,
protecting sensitive information from external threats.
Intranets are used for various purposes such as document management, employee
directories, project management, internal news, and policies dissemination.
Internet:
The internet is a global network of interconnected computers and devices that use
standardized communication protocols to exchange data.
The internet facilitates access to a vast array of resources and services, including
websites, email, social media, online banking, e-commerce, and cloud computing.
Access to the internet is public and unrestricted, allowing anyone with an internet
connection to access information and services available on the World Wide Web.
It plays a crucial role in connecting businesses with customers, suppliers, partners, and
markets worldwide, enabling global trade and economic activities.
The internet serves as a platform for innovation, enabling the development of new
technologies, digital services, and business models.
Comparison:
1. Access: Intranets are private networks accessible only to authorized users within an
organization, while the internet is a public network accessible to anyone with an internet
connection.
3. Security: Intranets are typically more secure than the internet since access is restricted to
authorized users, and additional security measures can be implemented to protect
sensitive information. The internet, on the other hand, is subject to various security
threats and risks, such as malware, phishing, and data breaches.
4. Purpose: Intranets are primarily used for internal communication, collaboration, and
information sharing within an organization, while the internet serves a broader range of
purposes, including communication, research, entertainment, commerce, and social
interaction.
Internet: The internet is essential for modern businesses to connect with customers,
suppliers, partners, and markets worldwide. It enables businesses to reach a global
audience, promote their products and services, and conduct e-commerce transactions. The
internet facilitates online marketing, advertising, and customer engagement through
websites, social media, and digital platforms. Businesses leverage the internet for market
research, competitive analysis, and trend monitoring to inform strategic decision-making.
Moreover, the internet enables businesses to access cloud-based services, software
applications, and digital tools for various operations, such as accounting, customer
relationship management (CRM), and project management.
S.N
O Internet Intranet
2. On the internet, there are multiple users. On an intranet, there are limited users.
On the internet, there is more number of In the intranet, there is less number of
4.
visitors. visitors.
6. Anyone can access the Internet. In this, anyone can’t access the Intranet.
information
The Internet is a public network that is not Intranets are private networks that are
14. owned by any particular organization or owned and managed by the organization
group. that uses them.
5. Describe the structure of an IP Datagram including its various fields. how does the IP
datagram format facilitates data delivery in a network?
Assignment-II
1. Consider a network where RIP (Routing Information Protocol) is used. If a router has a
metric of 16 for a route, what does this metric value signify in RIP.
2. In OSPF (Open Shortest Path First), explain the concept of area types and how they
contribute to network design.
3.A TCP connection has a window size of 500 bytes. After successfully receiving
acknowledgment for the first 200 bytes, calculate the new window size if the receiver
advertises a window size of 300.
Assignment-III
1. Consider an IEEE 802.11 WLAN operating in the 2.4 GHz band with a data rate of 54
Mbps. Calculate the time required to transmit a 1500-byte frame under the assumption of
no interference or collisions.
2. A mobile node initiates a registration process with a foreign agent. If the registration
process involves a total of 500 bytes of control information, calculate the total data
transmitted over the network if the mobile node uses a tunneling technique during
registration.
5. Provide an overview of IEEE 802 .11 system architecture including the protocol
architecture and Physical layer.
Assignment-IV
1.If a mobile device using M-TCP establishes a connection with a server and the Round-
Trip Time (RTT) between them is 150 milliseconds, calculate the initial value of the
timeout for the retransmission timer using the Karn/Partridge algorithm (assuming no
retransmissions have occurred yet).
2. A GSM network has a cell with a radius of 1 kilometer. If the network uses Frequency
Division Multiple Access (FDMA) with 200 kHz bandwidth per channel, calculate the total
number of channels available for this cell.
3. Provide real world examples for scenarios where the use of I-TCP ,S-TCP or M-TCP
would be particularly advantageous.
4. Provide insight into the handover process in cellular networks discuss the challenges and
strategies associated with seamless handovers.
5. Compare cellular networks with WLANs . highlight the key differences in terms of
coverage capacity and deployment scenarios.